Artículos de revistas sobre el tema "Hackers"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Hackers".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Hausken, Kjell. "Information Sharing Among Cyber Hackers in Successive Attacks." International Game Theory Review 19, no. 02 (2017): 1750010. http://dx.doi.org/10.1142/s0219198917500104.
Texto completoOdemis, Murat, Cagatay Yucel, and Ahmet Koltuksuz. "Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System." Security and Communication Networks 2022 (January 27, 2022): 1–28. http://dx.doi.org/10.1155/2022/7620125.
Texto completoBátfai, Norbert, Renátó Besenczi, József Szabó, et al. "DEAC-Hackers: játszó hackerek, hackelő játékosok." Információs Társadalom 18, no. 1 (2018): 132. http://dx.doi.org/10.22503/inftars.xviii.2018.1.9.
Texto completoHausken, Kjell. "Proactivity and Retroactivity of Firms and Information Sharing of Hackers." International Game Theory Review 20, no. 01 (2018): 1750027. http://dx.doi.org/10.1142/s021919891750027x.
Texto completoNycyk, Michael. "The New Computer Hacker’s Quest and Contest with the Experienced Hackers: A Qualitative Study applying Pierre Bourdieu’s Field Theory." International Journal of Cyber Criminology 10, no. 2 (2016): 92–109. https://doi.org/10.5281/zenodo.163402.
Texto completoCekerevac, Zoran, Zdenek Dvorak, Ludmila Prigoda, and Petar Cekerevac. "Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking." Communications - Scientific letters of the University of Zilina 20, no. 2 (2018): 83–87. http://dx.doi.org/10.26552/com.c.2018.2.83-87.
Texto completoDeepti, Chaudhari1 Hetvi Patel2 Anushri Ghosh3 Neha Patil4 Vikas Pawar5 Yogesh Sonawane6. "A Survey on Image steganography using Genetic Algorithm." Scandinavian Journal of Information Systems 35, no. 1 (2023): 131–35. https://doi.org/10.5281/zenodo.7858158.
Texto completoGuo, Boyu. "Why Hackers Become Crackers – An Analysis of Conflicts Faced by Hackers." Public Administration Research 5, no. 1 (2016): 29. http://dx.doi.org/10.5539/par.v5n1p29.
Texto completoAl-Ajlouni, Mahmoud Mohammad. "Human Resources and their Tendency to Information Security Crimes Based on Holland Theory." Information Resources Management Journal 31, no. 4 (2018): 44–58. http://dx.doi.org/10.4018/irmj.2018100103.
Texto completoScariot Esquivel, Nelson. "Hackers, política y revolución." Question/Cuestión 3, no. 72 (2022): E716. http://dx.doi.org/10.24215/16696581e716.
Texto completoBratus, Sergey. "Hacker Curriculum : How Hackers Learn Networking." IEEE Distributed Systems Online 8, no. 10 (2007): 2. http://dx.doi.org/10.1109/mdso.2007.4384582.
Texto completoBanda, Raphael, Jackson Phiri, Mayumbo Nyirenda, and Monica M. Kabemba. "Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools." Zambia ICT Journal 3, no. 1 (2019): 40–51. http://dx.doi.org/10.33260/zictjournal.v3i1.74.
Texto completoAtul, Kulkarni, and Mukhopadhyay Debajyoti. "Data Spread among Vehicular Networks with Minimal Cost and Privacy." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 1 (2018): 111–14. https://doi.org/10.11591/ijeecs.v9.i1.pp111-114.
Texto completoBellaby, Ross W. "An Ethical Framework for Hacking Operations." Ethical Theory and Moral Practice 24, no. 1 (2021): 231–55. http://dx.doi.org/10.1007/s10677-021-10166-8.
Texto completoWarren, Matthew, and Shona Leitch. "Hacker Taggers: A new type of hackers." Information Systems Frontiers 12, no. 4 (2009): 425–31. http://dx.doi.org/10.1007/s10796-009-9203-y.
Texto completoKulkarni, Atul, and Debajyoti Mukhopadhyay. "Data Spread among Vehicular Networks with Minimal Cost and Privacy." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 1 (2018): 111. http://dx.doi.org/10.11591/ijeecs.v9.i1.pp111-114.
Texto completoIsnarti, Rika. "The Role of China’s Patriotic Hackers and Their Relationship to the Government." Andalas Journal of International Studies (AJIS) 4, no. 2 (2015): 161. http://dx.doi.org/10.25077/ajis.4.2.161-180.2015.
Texto completoMohsin, Rashid Shaikh, and Sunil Sangle Harshal. "Moral Hacking & Hacking Assaults." Recent Innovations in Wireless Network Security 6, no. 1 (2023): 1–5. https://doi.org/10.5281/zenodo.10039412.
Texto completoLaksmiati, Dewi. "Vulnerability Assessment with Network-Based Scanner Method for Improving Website Security." Journal of Computer Networks, Architecture and High Performance Computing 5, no. 1 (2023): 38–45. http://dx.doi.org/10.47709/cnahpc.v5i1.1991.
Texto completoManik, Burju Manik, and Imran Lubis. "Perbandingan Kinerja Ipcop dengan Honeypot dalam Mengamankan Server Linux dari Serangan Hacker." Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) 3, no. 1 (2021): 34–41. http://dx.doi.org/10.35447/jikstra.v3i1.356.
Texto completoRenushka, Madarie. "Hackers' Motivations: Testing Schwartz's Theory of Motivational Types of Values in a Sample of Hackers." International Journal of Cyber Criminology 11, no. 1 (2017): 78–97. https://doi.org/10.5281/zenodo.495773.
Texto completoDogra, Mrs Shallu, Nitin Singh, and Ayush Sahil. "A REVIEW PAPER ON ETHICAL HACKING." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem37588.
Texto completoWu, Yong, Junlin Duan, Tao Dai, and Dong Cheng. "Managing Security Outsourcing in the Presence of Strategic Hackers." Decision Analysis 17, no. 3 (2020): 235–59. http://dx.doi.org/10.1287/deca.2019.0406.
Texto completoAl-Tarawneh, Ahmed, and Ja’afer Al-Saraireh. "Efficient detection of hacker community based on twitter data using complex networks and machine learning algorithm." Journal of Intelligent & Fuzzy Systems 40, no. 6 (2021): 12321–37. http://dx.doi.org/10.3233/jifs-210458.
Texto completoJeong, Sarah, and Colin McSwiggen. "Hackers!" XRDS: Crossroads, The ACM Magazine for Students 20, no. 4 (2014): 38–42. http://dx.doi.org/10.1145/2604998.
Texto completoHollinger, Richard C. "Hackers." ACM SIGCAS Computers and Society 21, no. 1 (1991): 6–17. http://dx.doi.org/10.1145/122246.122248.
Texto completoWark, McKenzie. "Hackers." Theory, Culture & Society 23, no. 2-3 (2006): 320–22. http://dx.doi.org/10.1177/026327640602300242.
Texto completoMaxigas. "Hackers against technology: Critique and recuperation in technological cycles." Social Studies of Science 47, no. 6 (2017): 841–60. http://dx.doi.org/10.1177/0306312717736387.
Texto completoDudchik, Andrei Yu. "Partisans go cyber: The hacker ethic and partisans’ legacy." Vestnik of Saint Petersburg University. Philosophy and Conflict Studies 39, no. 2 (2023): 322–39. http://dx.doi.org/10.21638/spbu17.2023.209.
Texto completoAguado, Alexandre Garcia, and Isabel Alvarez Canovas. "Cultura hacker e educação: percepções dos hackers sobre a vivência de elementos de sua cultura nas escolas." Perspectiva 39, no. 3 (2021): 1–18. http://dx.doi.org/10.5007/2175-795x.2021.e81052.
Texto completoEtuh, Emmanuel, Francis S. Bakpo, George E. Okereke, and David Omagu. "Exploratory Data Analysis and Feature Selection for Social Media Hackers Prediction Problem." Computer Science & Engineering: An International Journal 13, no. 4 (2023): 01–19. http://dx.doi.org/10.5121/cseij.2023.13401.
Texto completoMs., Apurva Saxena*1 &. Dr.Anubha Dubey2. "KERBEROS AUTHENTICATION MODEL FOR DATA SECURITY IN CLOUD COMPUTING USING HONEY-POT." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 8 (2019): 35–44. https://doi.org/10.5281/zenodo.3367428.
Texto completoUlrich, Frank, Sune Müller, and Stephen Flowers. "The Professionalization of Hackers: A Content Analysis of 30 Years of Hacker Communication." Communications of the Association for Information Systems 52 (2023): 988–1016. http://dx.doi.org/10.17705/1cais.05246.
Texto completoTurgeman-Goldschmidt, Orly. "Hackers' Accounts." Social Science Computer Review 23, no. 1 (2005): 8–23. http://dx.doi.org/10.1177/0894439304271529.
Texto completoHathaway, Melissa. "Power Hackers." Scientific American 303, no. 4 (2010): 16. http://dx.doi.org/10.1038/scientificamerican1010-16.
Texto completoButler, Janet. "Hackers Beware!" EDPACS 15, no. 9 (1988): 6–8. http://dx.doi.org/10.1080/07366988809450472.
Texto completoPapathéodorou, Aris. "Hackers ouverts." EcoRev' N° 16, no. 2 (2004): 57–61. http://dx.doi.org/10.3917/ecorev.016.0057.
Texto completoStephenson, Peter. "Hiring Hackers." Information Systems Security 8, no. 2 (1999): 10–13. http://dx.doi.org/10.1201/1086/43305.8.2.19990601/31059.3.
Texto completoCrawley, Adrian. "Hiring hackers." Network Security 2016, no. 9 (2016): 13–15. http://dx.doi.org/10.1016/s1353-4858(16)30088-5.
Texto completoBall, Philip. "Medical hackers." Lancet 388, no. 10044 (2016): 554–55. http://dx.doi.org/10.1016/s0140-6736(16)31223-5.
Texto completoHighland, Harold Joseph. "Hackers revisited." Computers & Security 7, no. 4 (1988): 339. http://dx.doi.org/10.1016/0167-4048(88)90565-2.
Texto completoSchneier, B. "Airplane hackers." IEEE Security & Privacy 1, no. 6 (2003): 92. http://dx.doi.org/10.1109/msecp.2003.1266367.
Texto completoKera, Denisa, Zack Denfeld, and Cathrine Kramer. "Food Hackers." Gastronomica 15, no. 2 (2015): 49–56. http://dx.doi.org/10.1525/gfc.2015.15.2.49.
Texto completoMartínez-Cazalla, María Dolors. "Cazando hackers. Un regalo del ‘convidado de piedra’." Revista de Humanidades de Valparaíso, no. 12 (December 20, 2018): 115. http://dx.doi.org/10.22370/rhv.2018.12.1344.
Texto completoLange, Antoine, and Jean-François Henrotte. "Piratage éthique : mise à jour du cadre législatif pour une Belgique 2.0 ?" Pin Code N° 16, no. 4 (2023): 24–27. http://dx.doi.org/10.3917/pinc.016.0024.
Texto completoAsarudeen, S. Sheik, and R. Priya R. Priya. "Recruitment of Ethical Hackers." International Journal of Scientific Research 2, no. 1 (2012): 145–46. http://dx.doi.org/10.15373/22778179/jan2013/50.
Texto completoAji, Brian Budi. "TINDAKAN KEJAHATAN CYBER CRIME DALAM BENTUK DEFACE WEBSITE." Cyber Security dan Forensik Digital 6, no. 1 (2023): 25–29. http://dx.doi.org/10.14421/csecurity.2023.6.1.4049.
Texto completoFerenț, Darius-Antoniu. "The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN)." Intelligence Info 1, no. 1 (2022): 124–29. http://dx.doi.org/10.58679/ii52272.
Texto completoDarius-Antoniu, Ferenț. "The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN)." Intelligence Info 1, no. 1 (2023): 124–29. https://doi.org/10.58679/II52272.
Texto completoNikitina, Svetlana. "Hackers as Tricksters of the Digital Age: Creativity in Hacker Culture." Journal of Popular Culture 45, no. 1 (2012): 133–52. http://dx.doi.org/10.1111/j.1540-5931.2011.00915.x.
Texto completo